[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <AANLkTinOJyWJh=LTsUBOoR+7OTheKzNCLPR2kGzdNAUz@mail.gmail.com>
Date: Mon, 7 Feb 2011 12:52:50 +0100
From: Daniël W. Crompton <daniel.crompton@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: encrypt the bash history
On 4 February 2011 20:06, Zerial. <fernando@...ial.org> wrote:
Hi,
what is the best way to encrypt the bash_history file?
> I try using crypt/decrypt with GPG when login/logout. It works, but not
> safe enough.
what I did for a project I was working on was I create a LD_PRELOAD library
which overloaded the i/o operations and used gz and bz2. This could easily
be adapted to overload with encryption library functions rather than
compression libraries. You can also use this to keep the bash history in
memory using a shared memory location.
As said in the rest of the thread this won't completely stop root, but it
does make it more difficult.
D.
blaze your trail
--
Daniël W. Crompton <daniel.crompton@...il.com>
<http://specialbrands.net/>
<http://specialbrands.net/>
http://specialbrands.net/
<http://twitter.com/webhat>
<http://www.facebook.com/webhat><http://plancast.com/webhat><http://www.linkedin.com/in/redhat>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists